Research Article

Covert Network Analysis for Key Player Detection and Event Prediction Using a Hybrid Classifier

Table 2

Email database.

Sender node ID Receiver node ID Time stamp Email

2 5 1 Some text
2 3 1 Some text
2 4 1 Some text